Administrators use ____ logs that provide a detailed description of activity on the system.

A. file
B. directory
C. detailed
D. system

Answer: D

Computer Science & Information Technology

You might also like to view...

Which of the following information does an attacker enumerate by analyzing the AWS error messages that reveal information regarding the existence of a user?

A. Enumerating AWS account IDs B. Enumerating S3 buckets C. Enumerating IAM roles D. Enumerating bucket permissions

Computer Science & Information Technology

What is the purpose of a protocol analyzer?

What will be an ideal response?

Computer Science & Information Technology